[ 47.788394][ T26] audit: type=1800 audit(1566834461.617:25): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 47.834080][ T26] audit: type=1800 audit(1566834461.617:26): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 47.865914][ T26] audit: type=1800 audit(1566834461.617:27): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 47.920503][ T26] audit: type=1800 audit(1566834461.617:28): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.148' (ECDSA) to the list of known hosts. 2019/08/26 15:47:51 fuzzer started syzkaller login: [ 60.169653][ T8292] as (8292) used greatest stack depth: 23336 bytes left 2019/08/26 15:47:54 dialing manager at 10.128.0.26:45029 2019/08/26 15:47:54 syscalls: 2487 2019/08/26 15:47:54 code coverage: enabled 2019/08/26 15:47:54 comparison tracing: enabled 2019/08/26 15:47:54 extra coverage: extra coverage is not supported by the kernel 2019/08/26 15:47:54 setuid sandbox: enabled 2019/08/26 15:47:54 namespace sandbox: enabled 2019/08/26 15:47:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/26 15:47:54 fault injection: enabled 2019/08/26 15:47:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/26 15:47:54 net packet injection: enabled 2019/08/26 15:47:54 net device setup: enabled 15:49:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r0, 0x0, 0x3) 15:49:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000740)={@dev={0xfe, 0x80, [], 0x26}, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6, 0x0, 0x0, 0x100}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240)=0x40000008001, 0x4) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x4c, r1, 0xaf63eade197b0bb2, 0x70bd26, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffffffff15c}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xf771}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x8000000000000]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0xc927daa06351aa1b) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000440)="f2", 0xfe51, 0x0, 0x0, 0xfffffe58) [ 164.196910][ T8299] IPVS: ftp: loaded support on port[0] = 21 15:49:38 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x10001) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0xe439) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 164.308402][ T8301] IPVS: ftp: loaded support on port[0] = 21 [ 164.387539][ T8299] chnl_net:caif_netlink_parms(): no params data found [ 164.485608][ T8299] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.504076][ T8299] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.512012][ T8299] device bridge_slave_0 entered promiscuous mode 15:49:38 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) acct(&(0x7f00000004c0)='./file0\x00') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00\xd8<\x89\x90\x06\xe8\x89\xdc\xe1\xe3}\xd3\xc7\x15\xaa9\xac\a\xc9\xe6\xabNT\x8dl#F\x94w\xc5\xf2x\xc2p\xba8\x94\xac&\x87\xf6\xaab\xe9U\x80c\x99\xb00N\x82>Z#\x97)CW\x15\xac\xb9\x9a\xb4\xff\xd8+\vU\x89`f-%\x87B\xe2{\x02o\x80\xe2\x87d\xff*\a\xff\x88\xc0\x1e\ndv\x14+\xc6\xb5\x14\xa5\xf6HK\x1f\xcf\x888\x9f J\xf4\fA\xc6i$\xf0\xd25\xe6\xf3\xc2\x1d\xbb[Z\xc4\x8c=\x99\x90\xd5Y\xd7\xd2L\au\xbfS%\x98\xad\x14!\xb7G\x15', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80100, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000080)=0x10, 0x759f6b0f77b22962) r4 = dup2(r2, r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x3, &(0x7f0000000400)="11ffa5055e0b55ec7be070b4edd85997947a2a08eddfba969682ee6eb328678545293c0b94ad14a93d78fe664a48d58f48dc4f39c66ce3484dfe3fda49aa66a9fdeb62ffcbe46433466348da") socket(0x10, 0x200000000000803, 0x0) sendto$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fanotify_init(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000540)=0x1950, 0x4) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r6, &(0x7f0000000000)="cc", 0x1, 0x0, 0x0, 0x0) recvfrom$inet6(r6, 0x0, 0x0, 0x100002040, 0x0, 0x0) [ 164.555469][ T8299] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.575015][ T8304] IPVS: ftp: loaded support on port[0] = 21 [ 164.581069][ T8299] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.605958][ T8299] device bridge_slave_1 entered promiscuous mode [ 164.680001][ T8301] chnl_net:caif_netlink_parms(): no params data found [ 164.696253][ T8299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.736869][ T8299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.759404][ T8307] IPVS: ftp: loaded support on port[0] = 21 15:49:38 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x12}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=')', 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth0_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000240)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 164.816922][ T8299] team0: Port device team_slave_0 added [ 164.822792][ T8301] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.831721][ T8301] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.840532][ T8301] device bridge_slave_0 entered promiscuous mode [ 164.880265][ T8299] team0: Port device team_slave_1 added [ 164.887075][ T8301] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.898005][ T8301] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.914925][ T8301] device bridge_slave_1 entered promiscuous mode [ 164.937238][ T8310] IPVS: ftp: loaded support on port[0] = 21 [ 164.959853][ T8304] chnl_net:caif_netlink_parms(): no params data found [ 164.978810][ T8301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.989573][ T8301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:49:38 executing program 5: timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000740)='}vboxnet0selinuxwlan1\x00', 0xfffffffffffffffc) unshare(0x20600) geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sync_file_range(r0, 0xb7f, 0x0, 0x5) sched_rr_get_interval(0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) bind(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 165.066947][ T8299] device hsr_slave_0 entered promiscuous mode [ 165.107629][ T8299] device hsr_slave_1 entered promiscuous mode [ 165.180785][ T8301] team0: Port device team_slave_0 added [ 165.221580][ T8301] team0: Port device team_slave_1 added [ 165.239383][ T8304] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.246932][ T8304] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.254574][ T8304] device bridge_slave_0 entered promiscuous mode [ 165.261816][ T8304] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.268941][ T8304] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.276524][ T8304] device bridge_slave_1 entered promiscuous mode [ 165.345704][ T8301] device hsr_slave_0 entered promiscuous mode [ 165.384260][ T8301] device hsr_slave_1 entered promiscuous mode [ 165.434203][ T8301] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.456314][ T8312] IPVS: ftp: loaded support on port[0] = 21 [ 165.467737][ T8304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.499402][ T8307] chnl_net:caif_netlink_parms(): no params data found [ 165.512957][ T8304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.538722][ T8304] team0: Port device team_slave_0 added [ 165.571680][ T8304] team0: Port device team_slave_1 added [ 165.665708][ T8304] device hsr_slave_0 entered promiscuous mode [ 165.734431][ T8304] device hsr_slave_1 entered promiscuous mode [ 165.774130][ T8304] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.792585][ T8307] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.799732][ T8307] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.807808][ T8307] device bridge_slave_0 entered promiscuous mode [ 165.833521][ T8307] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.842047][ T8307] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.849675][ T8307] device bridge_slave_1 entered promiscuous mode [ 165.865354][ T8310] chnl_net:caif_netlink_parms(): no params data found [ 165.899507][ T8307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.910251][ T8307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.952066][ T8307] team0: Port device team_slave_0 added [ 165.986683][ T8307] team0: Port device team_slave_1 added [ 166.030415][ T8310] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.037605][ T8310] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.045501][ T8310] device bridge_slave_0 entered promiscuous mode [ 166.052883][ T8310] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.060020][ T8310] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.067882][ T8310] device bridge_slave_1 entered promiscuous mode [ 166.081709][ T8299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.101756][ T8310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.113388][ T8312] chnl_net:caif_netlink_parms(): no params data found [ 166.126583][ T8301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.138937][ T8310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.156870][ T8304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.170069][ T8301] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.184661][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.192570][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.227504][ T8307] device hsr_slave_0 entered promiscuous mode [ 166.285229][ T8307] device hsr_slave_1 entered promiscuous mode [ 166.324372][ T8307] debugfs: Directory 'hsr0' with parent '/' already present! [ 166.339130][ T8299] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.352903][ T8310] team0: Port device team_slave_0 added [ 166.361416][ T8310] team0: Port device team_slave_1 added [ 166.375006][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.382578][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.405501][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.417110][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.425713][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.432854][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.461157][ T8312] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.469148][ T8312] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.477788][ T8312] device bridge_slave_0 entered promiscuous mode [ 166.488643][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.496629][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.505209][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.513413][ T8317] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.520462][ T8317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.530348][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.539275][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.547639][ T8317] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.554707][ T8317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.562100][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.571131][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.579868][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.588496][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.596789][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.605736][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.613942][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.621715][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.629329][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.638332][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.647146][ T8317] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.654218][ T8317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.662270][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.670085][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.680602][ T8304] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.692295][ T8312] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.700015][ T8312] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.708201][ T8312] device bridge_slave_1 entered promiscuous mode [ 166.729780][ T8301] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 166.740492][ T8301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.765130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.773289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.781868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.790156][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.798291][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.807006][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.815430][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.830134][ T8312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.841421][ T8312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.905705][ T8310] device hsr_slave_0 entered promiscuous mode [ 166.974663][ T8310] device hsr_slave_1 entered promiscuous mode [ 167.034211][ T8310] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.055532][ T8312] team0: Port device team_slave_0 added [ 167.069736][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.078511][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.087028][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.094106][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.101909][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.110852][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.119186][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.126222][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.133605][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.142410][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.152012][ T8312] team0: Port device team_slave_1 added [ 167.227405][ T8312] device hsr_slave_0 entered promiscuous mode [ 167.284339][ T8312] device hsr_slave_1 entered promiscuous mode [ 167.334189][ T8312] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.347450][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.358599][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.367246][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.376770][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.385615][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.393799][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.402015][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.415592][ T8301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.435078][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.450300][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.460363][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.470089][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.478440][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.486781][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.503404][ T8299] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 167.514053][ T8299] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.535290][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.543712][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.553067][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.563417][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.577787][ T8307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.598993][ T8299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.607576][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.616640][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.625250][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.643388][ T8304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.662607][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.674643][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.685065][ T8307] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.712882][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.723102][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.731680][ T8319] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.738780][ T8319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.750773][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.781650][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.790842][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.799525][ T3504] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.806639][ T3504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.814853][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.823247][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.838269][ T8310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.903155][ T8310] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.928800][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.956158][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.965890][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.975024][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.983266][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.991732][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.000255][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.008676][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.017392][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.028096][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.036026][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.056976][ T8304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.066071][ T8307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.079802][ T8312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.102987][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.112785][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.128945][ T8319] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.136041][ T8319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.145309][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.153806][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.162207][ T8319] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.169292][ T8319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.177368][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.186548][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.212035][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.222137][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.231304][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.240256][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.248842][ T8319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.258665][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.273918][ T8312] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.291300][ T8310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 168.301803][ T8310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.319211][ T8307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.329306][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.342983][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.350806][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.361816][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.371136][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.380017][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.388496][ T8316] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.395566][ T8316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.403017][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.411515][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.420741][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.428340][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.444702][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.460043][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.492123][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.499342][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state 15:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup3(r1, r0, 0x0) open(0x0, 0x0, 0x0) [ 168.537869][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.547559][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.557035][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.566969][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.576659][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.589369][ T8310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.617976][ T8312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 168.635526][ T8312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.670031][ C0] hrtimer: interrupt took 37544 ns [ 168.713918][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.723769][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.739486][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:49:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x8000000007, 0x0, r1}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1060, &(0x7f00000014c0)=""/4096}, 0x48) 15:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup3(r1, r0, 0x0) open(0x0, 0x0, 0x0) [ 168.769102][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.793242][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.807560][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:49:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r0, 0x0, 0x3) [ 168.838556][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.883829][ T8312] 8021q: adding VLAN 0 to HW filter on device batadv0 15:49:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000080000000000000000000ffffffff020000000d000000000000000000697036677265300000cd000000000000677265300000000000000000000000006272696467655f736c6176655f31000076657468315f746f5f62726964676500aaaaaaaaaabbf23d24830000aaaaaaaaaabb0000000000000000b0000000b4000000e800000071756f7461000000000000000000000001e9ff0000000000000000000000000018000000000000000000000000000000000000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000dfefffff000000001500001000000000000069705f7674693000000000000000000073797a5f74756e00000000000000000073697430000000000000000000000000626f6e64300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaaaa0000000000000000c0000000c0000000f000000068656c70657200000000000000000000000000000000000000000000010000000000000000000000000000005241530000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff0000000000000000000000000023000000000000000000000000000000000000000000000000000002000000feffffff00000000"]}, 0x2e0) gettid() setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 15:49:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x0) 15:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup3(r1, r0, 0x0) open(0x0, 0x0, 0x0) 15:49:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfd, &(0x7f0000000000)=0x0) io_destroy(r0) 15:49:43 executing program 1: mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x1000009, 0x40000000000032, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f000023e000/0x4000)=nil, &(0x7f00005cc000/0x2000)=nil, &(0x7f0000432000/0x4000)=nil, &(0x7f0000ee5000/0x4000)=nil, &(0x7f0000031000/0x2000)=nil, &(0x7f00002e0000/0x3000)=nil, &(0x7f0000291000/0x2000)=nil, &(0x7f000026b000/0x4000)=nil, &(0x7f0000ae9000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000747000/0x3000)=nil, 0x0}, 0x68) 15:49:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfd, &(0x7f0000000000)=0x0) io_destroy(r0) 15:49:43 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3580, 0x0, 0x2f, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2b6, 0x2d9}}}}}, 0x0) 15:49:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup3(r1, r0, 0x0) open(0x0, 0x0, 0x0) 15:49:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfd, &(0x7f0000000000)=0x0) io_destroy(r0) 15:49:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfd, &(0x7f0000000000)=0x0) io_destroy(r0) 15:49:43 executing program 5: timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000740)='}vboxnet0selinuxwlan1\x00', 0xfffffffffffffffc) unshare(0x20600) geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sync_file_range(r0, 0xb7f, 0x0, 0x5) sched_rr_get_interval(0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) bind(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 15:49:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r0, 0x0, 0x3) 15:49:43 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:44 executing program 3: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfd, &(0x7f0000000000)=0x0) io_destroy(r0) 15:49:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfd, &(0x7f0000000000)=0x0) io_destroy(r0) 15:49:44 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, 0x0) 15:49:44 executing program 5: timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000740)='}vboxnet0selinuxwlan1\x00', 0xfffffffffffffffc) unshare(0x20600) geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sync_file_range(r0, 0xb7f, 0x0, 0x5) sched_rr_get_interval(0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) bind(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 15:49:44 executing program 3: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000140)={0x0, 0x0, 0x7fffffffffffffff, 0x20}) 15:49:44 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfd, &(0x7f0000000000)=0x0) io_destroy(r0) 15:49:44 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:44 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:44 executing program 5: timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000740)='}vboxnet0selinuxwlan1\x00', 0xfffffffffffffffc) unshare(0x20600) geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sync_file_range(r0, 0xb7f, 0x0, 0x5) sched_rr_get_interval(0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) bind(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 15:49:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r0, 0x0, 0x3) 15:49:44 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:44 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:44 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:44 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:45 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x1, 0x0, &(0x7f0000000100)=0xffffffff00000007) 15:49:45 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000000840)=""/123, 0x7b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0), 0x3f7, 0x0) 15:49:45 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:45 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:45 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:45 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:45 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) utimes(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@dev, @in=@empty}}, {{}, 0x0, @in=@initdev}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0x10) sendto$netrom(0xffffffffffffffff, &(0x7f0000000d40)="0fe92a1a2defdcf6578f792961e29607cc4248f46dbd501853141807cc594fb86f62b95670cc7400f8", 0x29, 0x0, &(0x7f0000000dc0)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 15:49:45 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000000840)=""/123, 0x7b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0), 0x3f7, 0x0) 15:49:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfffffec7, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2f, 0x845, 0x0, 0x0, {0x2811, 0x7b5f7}}, 0x14}}, 0x0) 15:49:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r1, 0x403, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x5, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) 15:49:45 executing program 4: socketpair$unix(0x1, 0x97d87268f148058d, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x5, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='caif0\x00', 0x6, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f0000002880)={&(0x7f00000002c0)={0x6d4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6}, [@typed={0x14, 0x1f, @ipv6=@mcast1}, @typed={0x8, 0x0, @fd}, @nested={0x6a4, 0x5f, [@generic, @typed={0xc, 0x0, @u64=0xcd0}, @generic="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", @generic="00444d384eadf57cf755f47d917eb49dd9365e941957", @typed={0x8, 0x0, @ipv4}, @generic, @generic="1521faa1e95bb619cb7f3d407e5074"]}]}, 0x6d4}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000680)={0x0, 0x0, 0x0, 0xffffffffffffff01}) 15:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 15:49:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r1, 0x403, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x5, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) 15:49:45 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x8000) 15:49:46 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000000840)=""/123, 0x7b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0), 0x3f7, 0x0) 15:49:46 executing program 4: socketpair$unix(0x1, 0x97d87268f148058d, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x5, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='caif0\x00', 0x6, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f0000002880)={&(0x7f00000002c0)={0x6d4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6}, [@typed={0x14, 0x1f, @ipv6=@mcast1}, @typed={0x8, 0x0, @fd}, @nested={0x6a4, 0x5f, [@generic, @typed={0xc, 0x0, @u64=0xcd0}, @generic="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", @generic="00444d384eadf57cf755f47d917eb49dd9365e941957", @typed={0x8, 0x0, @ipv4}, @generic, @generic="1521faa1e95bb619cb7f3d407e5074"]}]}, 0x6d4}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000680)={0x0, 0x0, 0x0, 0xffffffffffffff01}) 15:49:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r1, 0x403, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x5, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) 15:49:46 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffd6a, &(0x7f0000000080)={0x0, 0xfffffffffffffda0}}, 0x0) r0 = socket(0x4000000000010, 0x1000000000080002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)="290000001800190000003fffffffda0602007a00fde8ff01084800040d0005000000000000000000ff", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x42, 0x0) 15:49:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 15:49:46 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 15:49:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r1, 0x403, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x5, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) 15:49:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 15:49:46 executing program 4: socketpair$unix(0x1, 0x97d87268f148058d, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x5, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='caif0\x00', 0x6, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f0000002880)={&(0x7f00000002c0)={0x6d4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6}, [@typed={0x14, 0x1f, @ipv6=@mcast1}, @typed={0x8, 0x0, @fd}, @nested={0x6a4, 0x5f, [@generic, @typed={0xc, 0x0, @u64=0xcd0}, @generic="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", @generic="00444d384eadf57cf755f47d917eb49dd9365e941957", @typed={0x8, 0x0, @ipv4}, @generic, @generic="1521faa1e95bb619cb7f3d407e5074"]}]}, 0x6d4}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000680)={0x0, 0x0, 0x0, 0xffffffffffffff01}) [ 172.538105][ T8563] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 15:49:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 15:49:46 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000000840)=""/123, 0x7b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0), 0x3f7, 0x0) [ 172.581941][ T8557] device nr0 entered promiscuous mode 15:49:46 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x8, 0x0, 0x0) 15:49:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, &(0x7f00000004c0)) 15:49:46 executing program 4: socketpair$unix(0x1, 0x97d87268f148058d, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x5, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='caif0\x00', 0x6, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f0000002880)={&(0x7f00000002c0)={0x6d4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6}, [@typed={0x14, 0x1f, @ipv6=@mcast1}, @typed={0x8, 0x0, @fd}, @nested={0x6a4, 0x5f, [@generic, @typed={0xc, 0x0, @u64=0xcd0}, @generic="33574a0d7d29b82d9ac736ac1c2ca08bc83f6b4d73238d1e9782dbab1d142891ad2aba919a0a7d7dfa9feebf508067350d5cab589dcf680c479631ec36ba66b47b8f7e977bef7b2aa412fadf0a73cd7cd4cd2802b2a3abea3b07ede310f97f88a20c6b3ff3cfe11140d5578ff07203f795a3294dda8706e3ba7ce11b9b59108dc0986b437794a3de996e30864b0432a3f50e72e0ec8f030bcf0f32cac57df98565dee2fe82e40c6822baac32af5d5fe08456c4e2744fb484d878d399ab51f0ed6771c53c9173d856b7f79fb01e6f457338ec2b4607ce0f0fd5c583d2b2d9b583345c810e29dc84ce58908a604af38e50c50df435c96627df777403c59d9fd1cea45e962e788618b622170ca6867546e84acc948d203a163ef0555fd8e8cedf1b8263a4864dbd1805e85b9e98ddcb0b3392c88ac04a746e797a66890b06a16098ddba673df921df54750b6d9c403be8b8150d7745c37f0eed622ecdfb481a42ef25f61709832affef171ef26f529bcca9e544c5eac7a28a01adeda9cc845d960ab01fa3807855d750c76c7a7dc82c07fb66b3cf6927873b084b06a490905f71eb23180d4ad9367690143d52a6fcb406c497a90c5f5f477ce6099aca00ccaa946bb7d9d807d3acd23d00690e720eeadab4c501fac140f5733b1f189aa93672ab9ba8d7684bb1456d6bf88353ab2a57aee2d8e8ce88e2f36f5ab9e370095982e8f9c29fcb09f5f19261a9a619861eac6f11e15a771a86274afa91945ddf74ab307523e168cfca30e35f44219644d686a9412af412d4393e126b4c016de65807588389aca7b644dcb6f2ed8021def2206b31f2ef75ef02e73ca5d72e63ee7a8c931c105f1bf46e7cada8b598dbea28e8a50a2f91438a2d10489772f3c90f837a2d79d39fd55ff4451f84a09badfa4dec93a4665b784050e0621ee6f858b0382ee1838be44a4a58a3b2df1a46e6af045ddb46b94c1abfed8520b198022063a07b3ca9d102e9ff2f4159bdbc6129ba73d0a2290ee127b28ed9908db9e185aacb1f779b4c31447156e3d40ca9509ee5ae6816a0aa1ab855dab4503c7a2b4e182823dc13c0bae6516dee5b921565161f67b9626d4f87823f58aa756bda7d40c5d70e9ad783a797098e5e7e01f131457c4eba1e68624e276f9ed93fb924c8f4481e8b09dd9dac023cb0be0c6bfbd761b7dae7571e907de1701c6cbb2e67f045bf7ec4ef0f8f881dee761a9d5ebde4d4e963c175dde8a4ec3c2e85bb9dfd1470c4b80704276ed4179148451631f3108ba7da8fadc0425e601fd363be99ea29a6b39bae85705fcd9971613035d72a549599eb20e7f690022a0eca6691140ee8422ec9464d013cd1559deaed7538d08b7272ff6c2422ed96edb0a2b94206ab652dad180ada5249b1619f07652a58f9345f4dd6d31ade4e1b9b6cf991ec1f124ee12f441f5439b8b865918b5045657acdd14acd2fe874bccd1a4698ead5652cdf66e3cafb241a47278e55ec2be876d5e8ef4fb0b2c360d97e69d7ff01999d1a8bda7beefa55c740ca99d9b50b45383c77731e9fcc6ee2c56c35e52f2018c64e6be1bb39c3e019bd5c87d762afce65d48176636ceed5d16907a3a316c0152ef31bc34894933798be5074b76c12e4ffbf9359464a61492e1c80a851cf5ab0623260f7e4ae3312376ce914a5fc8a55ac1a0c0799d407df775fd5bd9b599ed50d068d4210267f3cf756acf7998a780f46ace9d26a166e517c92805c82ae3285e72b9a9af5ed2ce5f8c2c3f6e1f5c13de2a158607b9aabae40aec1f2b2806984115151e4977cb756a5c39866f40fab710765f9fde58c20660d85d3785316ab02de689b3071c60ad8b976a5cd4987f1a891c7559ad9b36c2433fb6fda1d2f7db8a2575b93ba6e284d0f921eefbfbbd30d42edb87189e3059a00e2f81f748e0648bf638a909c427cdf2f9dacbda2d38bb22e2c658b48749c3030a0409ce081d81aa8e215474e7207c559790010310194c2076038971202b3fb99e7e6c01291abcb09c7b3dc77d2543fe6db1fbc580fdcc5ab3a9418d1cc0551a3b54e593011b8b8bd9c5fcb865dc3166f007dc333b6f6fc93f1da77a6d19b5d259c42e8251f45150d5b1cae8b721a96bf50aa12a4c8c46478f8b74175859bec275622e2c944b45b280c480cfc291f1c0d0d473354e2b541ae66e6ebd0b864aee7a8eea6315aa0bf7fefa727c62bda21a2dedb7162408ce4d269da0d2fddea2cc65064566f02caf853f7f503b3e38dbf6de45d0ee1835ad6b1d6b6a8698d89079b2b2d8ae851a8f32090cfe8b6a9383e53b8478aabc5", @generic="00444d384eadf57cf755f47d917eb49dd9365e941957", @typed={0x8, 0x0, @ipv4}, @generic, @generic="1521faa1e95bb619cb7f3d407e5074"]}]}, 0x6d4}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000680)={0x0, 0x0, 0x0, 0xffffffffffffff01}) 15:49:46 executing program 5: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 15:49:46 executing program 5: r0 = memfd_create(&(0x7f0000000700)='-\'\x00\x10\f\xdex\xf5\a\xd91\xc4dT\x12P\xc6\x89\x0e\x83\xe7\x1b\xbd\xa5\xb4\xc2H\r\xe1\x8e[\xd6\x11\xfb\xfe&\xd2\x18\x88\x97\xea\x8eD\"\x9a\xfbpk\x18\xcb\xb3rR`\xa4\xbbzM\x84\xfb\xbd\xe3c\xe09\xd0\xc4\t\xaf\bC\x81\xb7\x05E\x8c\x8a$\x84\xe3\x06-61\x13\xeb\xc9\xb8\xe4\xea\aSs\rqM\xbbQ\xa6o\x9e!S\x17`\x18V\xbe\xb8N\xad\r9\x15\x8f\x92\x9b\'\xb7\xf2j\xa14&gPC\xbeS\xaf6\x04w\xc3\f\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 15:49:47 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='/dev/uinput\x00'], 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 15:49:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x4, r1, 0x0) 15:49:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) pwrite64(r1, 0x0, 0x0, 0x0) 15:49:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\xaa/\xba\x01\x00', 0x1132}) socket$kcm(0x2, 0x0, 0x2) 15:49:47 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 15:49:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\xaa/\xba\x01\x00', 0x1132}) socket$kcm(0x2, 0x0, 0x2) 15:49:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x4, 0x0, &(0x7f0000000080)) [ 173.775199][ T8634] device nr0 entered promiscuous mode 15:49:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 15:49:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\xaa/\xba\x01\x00', 0x1132}) socket$kcm(0x2, 0x0, 0x2) 15:49:47 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0xa, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0, 0x61, 0x30]}}, &(0x7f0000000840)=""/6, 0x29, 0x6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x57, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000050000006a0a00fe00000000850000000a000000b700000000000000950000ff000000009cc6b3fcd62c7d1c6238975d43a4505f80fc889f3c530cf08e467b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707ba3b1d4e984c46ea7e2b347a36f5662403e1b2be4cc7c2683908a24411a9872971c7c56f0979bd10b97163c1d6d01009cd4fb21a6d06b50e57b6ede4fab0e196bf02f46c7953ab1abda45cbe8f9de9ca3c00cb9bf4e418d07fa22f0610a70f2bdf4000000000000b0c29c0dd8e263f63223b7b80197aa743f7555193161f4bcb36b5ceaa8f839a2e5ca27be29efd7c8e07ede907c84c2073c6a7a4defbd66bbe0f4332a8af33547b6184e28da08a3bd2acc762091214c72a7c3485baf474315760e4ce30552e2571b36173b39c252747621883b246a0eb21105278de7b680ae57c55704dfc1bf3374410bc8e591af23b0debd727834bbdff3375bfab8f324d4654cd7cdb2d99d3bc528c83418466662682f11826aa290a6627504c5123e43b785ce9f9b281ac405bb237f9db926a58c2a14780e497cc1b47d3652c546f84537a7b7da1860331fd113c8adf4fade3285cd744c40ccfb8bd9acecf10026d8d73b688970992cbc2ef2a8ce00f082eda24755c65a38cda59c35c58444e5dd8bf51dcf76c3a906d702280261ef4e31ff0837f1f00639cf6ecd2823888bb255704f04c8c3f6fd4eb4906813b62fd3c3bfca0c8cfb1a7635714600814fee0d870b4e2809271b20477bdba90eaa5bcfe76b976fbab2347aef1a0f0a1b0c02d15fc60e16af5b36a33ae4d35082793646f412727efbaa75f070b8b93512f2ed1fb86a5087e309e37b17ed1f7c7309c5a14a7c72b814633870b409c6ee0a"], &(0x7f00000008c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f00000007c0), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000400)={&(0x7f00000002c0)=""/95, 0x5f, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r1, 0x10, &(0x7f0000000480)={&(0x7f0000000280)=""/5, 0x5, r3}}, 0x10) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) [ 173.898718][ T8631] device nr0 entered promiscuous mode 15:49:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)={0x28, r1, 0x721, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 15:49:48 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 15:49:48 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0xa, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0, 0x61, 0x30]}}, &(0x7f0000000840)=""/6, 0x29, 0x6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x57, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f00000008c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f00000007c0), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000400)={&(0x7f00000002c0)=""/95, 0x5f, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r1, 0x10, &(0x7f0000000480)={&(0x7f0000000280)=""/5, 0x5, r3}}, 0x10) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) 15:49:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\xaa/\xba\x01\x00', 0x1132}) socket$kcm(0x2, 0x0, 0x2) 15:49:48 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 15:49:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)={0x28, r1, 0x721, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 15:49:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\xaa/\xba\x01\x00', 0x1132}) socket$kcm(0x2, 0x0, 0x2) 15:49:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)={0x28, r1, 0x721, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) [ 174.744291][ T8670] device nr0 entered promiscuous mode 15:49:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)={0x28, r1, 0x721, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 15:49:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\xaa/\xba\x01\x00', 0x1132}) socket$kcm(0x2, 0x0, 0x2) 15:49:48 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0xa, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0, 0x61, 0x30]}}, &(0x7f0000000840)=""/6, 0x29, 0x6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x57, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000050000006a0a00fe00000000850000000a000000b700000000000000950000ff000000009cc6b3fcd62c7d1c6238975d43a4505f80fc889f3c530cf08e467b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707ba3b1d4e984c46ea7e2b347a36f5662403e1b2be4cc7c2683908a24411a9872971c7c56f0979bd10b97163c1d6d01009cd4fb21a6d06b50e57b6ede4fab0e196bf02f46c7953ab1abda45cbe8f9de9ca3c00cb9bf4e418d07fa22f0610a70f2bdf4000000000000b0c29c0dd8e263f63223b7b80197aa743f7555193161f4bcb36b5ceaa8f839a2e5ca27be29efd7c8e07ede907c84c2073c6a7a4defbd66bbe0f4332a8af33547b6184e28da08a3bd2acc762091214c72a7c3485baf474315760e4ce30552e2571b36173b39c252747621883b246a0eb21105278de7b680ae57c55704dfc1bf3374410bc8e591af23b0debd727834bbdff3375bfab8f324d4654cd7cdb2d99d3bc528c83418466662682f11826aa290a6627504c5123e43b785ce9f9b281ac405bb237f9db926a58c2a14780e497cc1b47d3652c546f84537a7b7da1860331fd113c8adf4fade3285cd744c40ccfb8bd9acecf10026d8d73b688970992cbc2ef2a8ce00f082eda24755c65a38cda59c35c58444e5dd8bf51dcf76c3a906d702280261ef4e31ff0837f1f00639cf6ecd2823888bb255704f04c8c3f6fd4eb4906813b62fd3c3bfca0c8cfb1a7635714600814fee0d870b4e2809271b20477bdba90eaa5bcfe76b976fbab2347aef1a0f0a1b0c02d15fc60e16af5b36a33ae4d35082793646f412727efbaa75f070b8b93512f2ed1fb86a5087e309e37b17ed1f7c7309c5a14a7c72b814633870b409c6ee0a"], &(0x7f00000008c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f00000007c0), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000400)={&(0x7f00000002c0)=""/95, 0x5f, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r1, 0x10, &(0x7f0000000480)={&(0x7f0000000280)=""/5, 0x5, r3}}, 0x10) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) 15:49:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x1000000, 0x0, 0x0, 0x0, 0x7b, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0x28d, &(0x7f0000000240)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe59}, 0x48) [ 175.182214][ T8689] device nr0 entered promiscuous mode 15:49:49 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) exit_group(0x403) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x2710}}], 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x800e, 0x4, 0x0, 0x0, 0x6}, &(0x7f0000000280)=0x20) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 175.351130][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 175.351142][ T26] audit: type=1804 audit(1566834589.177:31): pid=8705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933447965/syzkaller.QwDAjJ/16/bus" dev="sda1" ino=16569 res=1 [ 175.381720][ T26] audit: type=1800 audit(1566834589.177:32): pid=8705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16569 res=0 15:49:49 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 15:49:49 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0xa, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0, 0x61, 0x30]}}, &(0x7f0000000840)=""/6, 0x29, 0x6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x57, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f00000008c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f00000007c0), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000400)={&(0x7f00000002c0)=""/95, 0x5f, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r1, 0x10, &(0x7f0000000480)={&(0x7f0000000280)=""/5, 0x5, r3}}, 0x10) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) 15:49:49 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 15:49:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x3, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 15:49:49 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) exit_group(0x403) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x2710}}], 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x800e, 0x4, 0x0, 0x0, 0x6}, &(0x7f0000000280)=0x20) sendfile(r1, r2, 0x0, 0x8000fffffffe) 15:49:49 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) exit_group(0x403) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x2710}}], 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x800e, 0x4, 0x0, 0x0, 0x6}, &(0x7f0000000280)=0x20) sendfile(r1, r2, 0x0, 0x8000fffffffe) 15:49:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x3, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 176.011998][ T26] audit: type=1804 audit(1566834589.837:33): pid=8718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir638777687/syzkaller.7Uqwq2/15/bus" dev="sda1" ino=16563 res=1 [ 176.090405][ T8731] device nr0 entered promiscuous mode [ 176.153213][ T26] audit: type=1800 audit(1566834589.837:34): pid=8718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16563 res=0 15:49:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x3, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 176.299614][ T26] audit: type=1804 audit(1566834589.977:35): pid=8728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933447965/syzkaller.QwDAjJ/17/bus" dev="sda1" ino=16542 res=1 [ 176.456583][ T26] audit: type=1800 audit(1566834589.977:36): pid=8728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16542 res=0 15:49:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x3, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 15:49:50 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x9, 0x2, 0x0, "3696f127e71a0671b90bdb040c8c868dea6bc88c8db592f3b1f69471df3f5841"}) 15:49:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.cpu/\x00\x8f\xf9\xbf\x80\x9e\x96\x1d6\xf4\xc78\x14-\xb5\v9\xca\x1b\xc4\xc0g\x90\x136\xf2\"Zi\xb4K\xa5\x93~Q\x9d\f\x84\x0e\xc9\xb0Gb#\xe5m#\x16\x12\x1e1\x9d', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x2761, 0x4) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) 15:49:50 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x9, 0x2, 0x0, "3696f127e71a0671b90bdb040c8c868dea6bc88c8db592f3b1f69471df3f5841"}) 15:49:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.cpu/\x00\x8f\xf9\xbf\x80\x9e\x96\x1d6\xf4\xc78\x14-\xb5\v9\xca\x1b\xc4\xc0g\x90\x136\xf2\"Zi\xb4K\xa5\x93~Q\x9d\f\x84\x0e\xc9\xb0Gb#\xe5m#\x16\x12\x1e1\x9d', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x2761, 0x4) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) 15:49:50 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) exit_group(0x403) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x2710}}], 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x800e, 0x4, 0x0, 0x0, 0x6}, &(0x7f0000000280)=0x20) sendfile(r1, r2, 0x0, 0x8000fffffffe) 15:49:50 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x9, 0x2, 0x0, "3696f127e71a0671b90bdb040c8c868dea6bc88c8db592f3b1f69471df3f5841"}) 15:49:50 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_coalesce={0xf}}) 15:49:50 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) exit_group(0x403) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x2710}}], 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x800e, 0x4, 0x0, 0x0, 0x6}, &(0x7f0000000280)=0x20) sendfile(r1, r2, 0x0, 0x8000fffffffe) 15:49:50 executing program 1: clock_gettime(0x88177ea3a79b984d, 0x0) 15:49:50 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x9, 0x2, 0x0, "3696f127e71a0671b90bdb040c8c868dea6bc88c8db592f3b1f69471df3f5841"}) 15:49:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) [ 177.121277][ T26] audit: type=1804 audit(1566834590.947:37): pid=8757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir638777687/syzkaller.7Uqwq2/16/bus" dev="sda1" ino=16567 res=1 15:49:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000002600)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000000c0), 0x4) 15:49:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.cpu/\x00\x8f\xf9\xbf\x80\x9e\x96\x1d6\xf4\xc78\x14-\xb5\v9\xca\x1b\xc4\xc0g\x90\x136\xf2\"Zi\xb4K\xa5\x93~Q\x9d\f\x84\x0e\xc9\xb0Gb#\xe5m#\x16\x12\x1e1\x9d', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x2761, 0x4) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) [ 177.273795][ T26] audit: type=1800 audit(1566834590.947:38): pid=8757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16567 res=0 15:49:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 15:49:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) 15:49:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) [ 177.426781][ T26] audit: type=1804 audit(1566834591.107:39): pid=8771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933447965/syzkaller.QwDAjJ/18/bus" dev="sda1" ino=16548 res=1 [ 177.556292][ T26] audit: type=1800 audit(1566834591.117:40): pid=8771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16548 res=0 15:49:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.cpu/\x00\x8f\xf9\xbf\x80\x9e\x96\x1d6\xf4\xc78\x14-\xb5\v9\xca\x1b\xc4\xc0g\x90\x136\xf2\"Zi\xb4K\xa5\x93~Q\x9d\f\x84\x0e\xc9\xb0Gb#\xe5m#\x16\x12\x1e1\x9d', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x2761, 0x4) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) 15:49:51 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg$sock(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr="b3d24b284660728f15e510562ea84c1b"}}}, 0x80, 0x0}}], 0x1, 0x0) 15:49:51 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) exit_group(0x403) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x2710}}], 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x800e, 0x4, 0x0, 0x0, 0x6}, &(0x7f0000000280)=0x20) sendfile(r1, r2, 0x0, 0x8000fffffffe) 15:49:51 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) exit_group(0x403) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x2710}}], 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x800e, 0x4, 0x0, 0x0, 0x6}, &(0x7f0000000280)=0x20) sendfile(r1, r2, 0x0, 0x8000fffffffe) 15:49:51 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB=':0:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 15:49:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) 15:49:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) [ 177.991592][ T8807] libceph: parse_ips bad ip ':0' [ 178.011750][ T8807] source parameter not specified 15:49:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) 15:49:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) 15:49:51 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x2, 0x238, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/568]}, 0x2b0) 15:49:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000100)='./file1\x00', r0, &(0x7f0000000080)='./file2\x00', 0x0) linkat(r0, &(0x7f0000000140)='./file2\x00', r0, &(0x7f00000001c0)='./file1\x00', 0x1400) 15:49:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@force='force'}, {@creator={'creator', 0x3d, "1b68c340"}}]}) 15:49:52 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="07010000920000000000000000000008000000000000000008000000000000000511000000000000000000d7d60a00000000000010000000"], 0x38) [ 178.371545][ T8831] hfsplus: unable to find HFS+ superblock [ 178.450689][ T8831] hfsplus: unable to find HFS+ superblock 15:49:52 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg$sock(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr="b3d24b284660728f15e510562ea84c1b"}}}, 0x80, 0x0}}], 0x1, 0x0) 15:49:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000001c0), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc562f656d6e511dcdaf041c8d8a0957939950c15c0104000000000000957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d800006806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)='+Fp') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 15:49:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x2, 0x8}, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000000)=r0, 0x4) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_retopts={{0x24, 0x0, 0x7, {[@rr={0x44, 0x9, 0x6, [@empty, @empty, @empty=0x2, @multicast2]}]}}}], 0x28, 0x5}, 0x0) 15:49:52 executing program 2: ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)}) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000080042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x8002, 0x0, 0x0, 0x0, 0x1000020000000, 0x7ff0bdbe}) 15:49:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() tkill(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast1, @loopback, @loopback}, 0xc) dup3(r0, r1, 0x0) [ 178.795125][ T8847] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 178.806554][ T8847] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 178.817629][ T8847] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 178.827660][ T8847] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:49:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000400)=@framed={{0xffffff85, 0x86040000, 0x0, 0x0, 0x6, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x47c, &(0x7f0000000300)=""/195}, 0x48) [ 178.879358][ T8857] vhci_hcd: default hub control req: c002 v2000 i0000 l0 [ 178.888753][ T8847] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 15:49:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000001c0), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc562f656d6e511dcdaf041c8d8a0957939950c15c0104000000000000957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d800006806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)='+Fp') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 15:49:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f00000074c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 178.994194][ T8873] [ 178.996546][ T8873] ********************************************************** [ 179.017646][ T8312] [ 179.025698][ T8312] ============================= [ 179.038677][ T8312] WARNING: suspicious RCU usage 15:49:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x2, 0x8}, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000000)=r0, 0x4) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_retopts={{0x24, 0x0, 0x7, {[@rr={0x44, 0x9, 0x6, [@empty, @empty, @empty=0x2, @multicast2]}]}}}], 0x28, 0x5}, 0x0) 15:49:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="00002f9c54e7"], 0x6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 179.051842][ T8312] 5.3.0-rc6-next-20190826 #73 Not tainted [ 179.087417][ T8312] ----------------------------- [ 179.120516][ T8873] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 179.132121][ T8312] fs/ext4/block_validity.c:333 suspicious rcu_dereference_check() usage! [ 179.190623][ T8312] [ 179.190623][ T8312] other info that might help us debug this: [ 179.190623][ T8312] [ 179.217098][ T8312] [ 179.217098][ T8312] rcu_scheduler_active = 2, debug_locks = 1 [ 179.220727][ T8873] ** ** 15:49:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x2, 0x8}, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000000)=r0, 0x4) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_retopts={{0x24, 0x0, 0x7, {[@rr={0x44, 0x9, 0x6, [@empty, @empty, @empty=0x2, @multicast2]}]}}}], 0x28, 0x5}, 0x0) 15:49:53 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000180)=0xfffffffffffffffd, 0x12) [ 179.237433][ T8312] 1 lock held by syz-executor.5/8312: [ 179.245683][ T8312] #0: ffff888056940858 (&type->s_umount_key#32){++++}, at: deactivate_super+0x1aa/0x1d0 [ 179.256589][ T8873] ** trace_printk() being used. Allocating extra memory. ** [ 179.291939][ T8873] ** ** [ 179.314410][ T8312] [ 179.314410][ T8312] stack backtrace: [ 179.342215][ T8312] CPU: 0 PID: 8312 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190826 #73 [ 179.351227][ T8312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.356118][ T8873] ** This means that this is a DEBUG kernel and it is ** [ 179.361301][ T8312] Call Trace: [ 179.361326][ T8312] dump_stack+0x172/0x1f0 [ 179.361345][ T8312] lockdep_rcu_suspicious+0x153/0x15d [ 179.381700][ T8312] ext4_release_system_zone+0x166/0x1a0 [ 179.387241][ T8312] ext4_put_super+0x954/0xd70 [ 179.390826][ T8873] ** unsafe for production use. ** [ 179.391906][ T8312] ? ext4_quota_write+0x5a0/0x5a0 [ 179.391924][ T8312] generic_shutdown_super+0x14c/0x370 [ 179.409613][ T8312] kill_block_super+0xa0/0x100 [ 179.414367][ T8312] deactivate_locked_super+0x95/0x100 [ 179.419720][ T8312] deactivate_super+0x1b2/0x1d0 [ 179.421652][ T8873] ** ** [ 179.424560][ T8312] ? mount_bdev+0x3c0/0x3c0 [ 179.424572][ T8312] ? dput+0x38/0xe10 [ 179.424586][ T8312] ? dput+0x1f2/0xe10 [ 179.424599][ T8312] ? mnt_get_writers.isra.0+0xf9/0x150 [ 179.424619][ T8312] cleanup_mnt+0x351/0x4c0 [ 179.424639][ T8312] ? trace_hardirqs_on+0x67/0x240 [ 179.432524][ T8873] ** If you see this message and you are not debugging ** [ 179.436458][ T8312] ? __kasan_check_read+0x11/0x20 [ 179.436473][ T8312] __cleanup_mnt+0x16/0x20 [ 179.436486][ T8312] task_work_run+0x145/0x1c0 [ 179.436504][ T8312] exit_to_usermode_loop+0x316/0x380 [ 179.436521][ T8312] do_syscall_64+0x65f/0x760 [ 179.440645][ T8873] ** the kernel, report this immediately to your vendor! ** [ 179.444359][ T8312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.444371][ T8312] RIP: 0033:0x45c2a7 [ 179.444386][ T8312] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.444393][ T8312] RSP: 002b:00007ffe632658a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 179.444411][ T8312] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 179.450128][ T8873] ** ** [ 179.454229][ T8312] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffe63265950 [ 179.454236][ T8312] RBP: 0000000000000039 R08: 0000000000000000 R09: 000000000000000a [ 179.454244][ T8312] R10: 0000000000000005 R11: 0000000000000202 R12: 00007ffe632669e0 [ 179.454251][ T8312] R13: 000055555577b940 R14: 0000000000000000 R15: 00007ffe632669e0 [ 179.615859][ T8312] ------------[ cut here ]------------ [ 179.621330][ T8312] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 179.630343][ T8312] WARNING: CPU: 0 PID: 8312 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 179.639784][ T8312] Kernel panic - not syncing: panic_on_warn set ... [ 179.646366][ T8312] CPU: 0 PID: 8312 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190826 #73 [ 179.652551][ T8873] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 179.655452][ T8312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.655457][ T8312] Call Trace: [ 179.655473][ T8312] dump_stack+0x172/0x1f0 [ 179.655488][ T8312] ? debug_print_object+0x90/0x250 [ 179.655502][ T8312] panic+0x2dc/0x755 [ 179.662842][ T8873] ********************************************************** [ 179.672869][ T8312] ? add_taint.cold+0x16/0x16 [ 179.672887][ T8312] ? __kasan_check_write+0x14/0x20 [ 179.672901][ T8312] ? __warn.cold+0x14/0x3c [ 179.710907][ T8312] ? __warn+0xd9/0x1d0 [ 179.714977][ T8312] ? debug_print_object+0x168/0x250 [ 179.720177][ T8312] __warn.cold+0x2f/0x3c [ 179.724409][ T8312] ? debug_print_object+0x168/0x250 [ 179.729670][ T8312] report_bug+0x289/0x300 [ 179.733984][ T8312] do_error_trap+0x11b/0x200 [ 179.738549][ T8312] do_invalid_op+0x37/0x50 [ 179.743021][ T8312] ? debug_print_object+0x168/0x250 [ 179.748194][ T8312] invalid_op+0x23/0x30 [ 179.752337][ T8312] RIP: 0010:debug_print_object+0x168/0x250 [ 179.758121][ T8312] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 179.777721][ T8312] RSP: 0018:ffff888063397b80 EFLAGS: 00010086 [ 179.783764][ T8312] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 179.791717][ T8312] RDX: 0000000000000000 RSI: ffffffff815bd606 RDI: ffffed100c672f62 [ 179.799661][ T8312] RBP: ffff888063397bc0 R08: ffff88806338c6c0 R09: ffffed1015d04109 [ 179.807605][ T8312] R10: ffffed1015d04108 R11: ffff8880ae820847 R12: 0000000000000001 [ 179.815552][ T8312] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff888099c174d0 [ 179.823504][ T8312] ? vprintk_func+0x86/0x189 [ 179.828114][ T8312] debug_check_no_obj_freed+0x2d4/0x43f [ 179.833717][ T8312] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 179.839234][ T8312] kfree+0xf8/0x2c0 [ 179.843030][ T8312] ext4_put_super+0x8e0/0xd70 [ 179.847675][ T8312] ? ext4_quota_write+0x5a0/0x5a0 [ 179.852668][ T8312] generic_shutdown_super+0x14c/0x370 [ 179.858026][ T8312] kill_block_super+0xa0/0x100 [ 179.862758][ T8312] deactivate_locked_super+0x95/0x100 [ 179.868110][ T8312] deactivate_super+0x1b2/0x1d0 [ 179.872939][ T8312] ? mount_bdev+0x3c0/0x3c0 [ 179.877408][ T8312] ? dput+0x38/0xe10 [ 179.881269][ T8312] ? dput+0x1f2/0xe10 [ 179.885229][ T8312] ? mnt_get_writers.isra.0+0xf9/0x150 [ 179.890656][ T8312] cleanup_mnt+0x351/0x4c0 [ 179.895127][ T8312] ? trace_hardirqs_on+0x67/0x240 [ 179.900119][ T8312] ? __kasan_check_read+0x11/0x20 [ 179.905133][ T8312] __cleanup_mnt+0x16/0x20 [ 179.909527][ T8312] task_work_run+0x145/0x1c0 [ 179.914110][ T8312] exit_to_usermode_loop+0x316/0x380 [ 179.919365][ T8312] do_syscall_64+0x65f/0x760 [ 179.923924][ T8312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.929797][ T8312] RIP: 0033:0x45c2a7 [ 179.933664][ T8312] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.953235][ T8312] RSP: 002b:00007ffe632658a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 179.961612][ T8312] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 179.969555][ T8312] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffe63265950 [ 179.977501][ T8312] RBP: 0000000000000039 R08: 0000000000000000 R09: 000000000000000a [ 179.985464][ T8312] R10: 0000000000000005 R11: 0000000000000202 R12: 00007ffe632669e0 [ 179.993428][ T8312] R13: 000055555577b940 R14: 0000000000000000 R15: 00007ffe632669e0 [ 180.002707][ T8312] Kernel Offset: disabled [ 180.007098][ T8312] Rebooting in 86400 seconds..